Posts tagged “Internet”
CEO Frank Plastina touts the company’s technical prowess and commitment to R&D while talking about Tekelec’s record year for profits. A focus on the “mobile IP core” for applications and services leads to sales and success in a world driven increasingly by mobile communications.
In a blog post, the search engine giant lays out its concept for the network that will offer "more than 100 times faster" speeds than most Americans now have.
"You've trusted this chip to hold your secrets, but your secrets aren't that safe," says Christopher Tarnovsky, 38, who runs the Flylogic security consultancy and demonstrated his hack last week at the Black Hat security conference. "It's sort of doing the impossible," says conference founder.
The recent attack on Google brings new attention to the buying and trading of information technology vulnerabilities. Zero days refer to security vulnerabilities caused by programming errors that haven't been "patched," or fixed, by the products' developers. Often those companies don't know the weaknesses exist and have had zero days to work on closing the holes. And hackers are ready to pounce.
Search engine giant announces the delay after a Chinese government spokesperson warns Google about compliance. "Foreign enterprises in China need to adhere to China's laws and regulations, respect the interests of the general public and cultural traditions and shoulder corresponding responsibilities. Google is no exception,” the government says.
Generally Web sites and computers are compromised from within. A hacker can get a Web page or computers to run programming code that they shouldn't. But in a case involving a Georgia family, it was a security gap between the phone and the Web site that exposed strangers' Facebook pages to them. Misconfigured equipment, poorly written network software or other technical errors could have caused AT&T to fumble the information flowing from their phones to Facebook and back.